Secura

Security is Going Sideways: 9 Ways Attackers Move Laterally in your Network

Cybersecurity threats don’t stand still - they move. After gaining initial access, adversaries use to move through a network aiming to escalate privileges, and access sensitive data. Let's talk about the how, why, and what's next.

Ymir Vigfusson
May 20, 2025
Secura

How APT Groups are Targeting Water Infrastructure in 2024/2025: Top Techniques Exploited by State-Sponsored Attackers

The adversaries targeting water infrastructure are skilled, organized, and often well-funded. Understanding how they attack is as important as why they attack.

Ymir Vigfusson
April 22, 2025
Secura

Attacking the Client: MFA Bypass Targeting Workstations

Cybercriminals are relentless and resourceful in their pursuit of vulnerabilities, and company employees and contractors often find themselves at the front line.

Ymir Vigfusson
April 2, 2025
Secura

Bypassing MFA: Understanding the 3 Categories of Bypass Techniques

Multi-factor authentication (MFA) is viewed as a key component of modern cybersecurity, but it’s far from invincible.

Ymir Vigfusson
August 20, 2024
Secura

How Hackers Use MFA Fatigue to Achieve Social Engineering

Cyber threats are becoming increasingly sophisticated, and one of the methods employed to achieve social engineering is through exploiting MFA (Multi-Factor Authentication) fatigue.

Árni Thor Árnason
March 21, 2024
Secura

How You Can Protect Your Organization From Social Engineering

Protecting yourself from social engineering is more crucial than ever. Social engineering is a form of manipulation used by cyber attackers to exploit human psychology and gain unauthorized access to personal information or sensitive data.

Ymir Vigfusson
March 4, 2024
Secura

How Do Spear Phishing Attacks Differ from Standard Phishing Attacks?

Phishing attacks have become an all too familiar threat in today’s digital world. In recent years, however, a new breed of cyber attack has emerged, known as spear phishing.

Ymir Vigfusson
February 17, 2024
Secura

What is Continuous Authentication, Really?

Traditional methods of authentication are no longer sufficient. Hackers have become adept at exploiting vulnerabilities in static password-based systems, leaving users and their valuable data at risk.

Ymir Vigfusson
February 14, 2024
Secura

Deploy Keystrike in 20 Minutes

Try Keystrike in Your Environment for 30 Days